Academic Year |
2024Year |
School/Graduate School |
School of Informatics and Data Science |
Lecture Code |
KA214001 |
Subject Classification |
Specialized Education |
Subject Name |
情報社会とセキュリティ |
Subject Name (Katakana) |
ジョウホウシャカイトセキュリティ |
Subject Name in English |
Information Society and Security |
Instructor |
KITASUKA TERUAKI,NAKANISHI TOORU,MUKAIDANI HIROAKI,NISHIMURA KOUJI |
Instructor (Katakana) |
キタスカ テルアキ,ナカニシ トオル,ムカイダニ ヒロアキ,ニシムラ コウジ |
Campus |
Higashi-Hiroshima |
Semester/Term |
3rd-Year, First Semester, 2Term |
Days, Periods, and Classrooms |
(2T) Tues1-4:ENG 107 |
Lesson Style |
Lecture |
Lesson Style (More Details) |
|
|
Credits |
2.0 |
Class Hours/Week |
|
Language of Instruction |
J
:
Japanese |
Course Level |
3
:
Undergraduate High-Intermediate
|
Course Area(Area) |
25
:
Science and Technology |
Course Area(Discipline) |
02
:
Information Science |
Eligible Students |
|
Keywords |
Information ethics, Information security, Information systems, Personal information, Cryptosystems, Intellectual property rights, Copyright |
Special Subject for Teacher Education |
|
Special Subject |
|
Class Status within Educational Program (Applicable only to targeted subjects for undergraduate students) | Learning the relationship between information technology and society. |
---|
Criterion referenced Evaluation (Applicable only to targeted subjects for undergraduate students) | Computer Science Program (Comprehensive Abilities) ・D2. Ability to derive optimal system solutions based on abundant cutting-edge information technologies for cross-sectoral issues in a diversified and complicated information society.
Data Science Program (Comprehensive Abilities) ・D3. Ability to overlook social needs and issues that are intertwined in a complex manner and to solve issues with quantitative and logical thinking based on data, a multifaceted perspective, and advanced information analysis ability.
Intelligence Science Program (Comprehensive Abilities) ・D3. Ability to grasp complexly intertwined social needs and issues from a bird's-eye view and solve issues with a multifaceted perspective and analytical ability based on a wide range of knowledge in intelligent science. |
Class Objectives /Class Outline |
To realize the influence and problems caused by information communication technology and the countermeasures, this class targets to learn information ethics, information security, social responsibility on information systems, protection of personal information, cryptosystems and their applications, intellectual property rights, and copyright. |
Class Schedule |
lesson 1 Information Ethics and Information Security lesson 2 Case studies and Measures on Information Security lesson 3 Information Security Management System lesson 4 Cloud Services and Information Security Management lesson 5 Strengthening Supply Chain Security in Mazda's Approach lesson 6 Social Responsibility of Information Systems lesson 7 Personal Information Handled by Information Systems lesson 8 Protection and Utilization of Personal Information on Information Systems lesson 9 Introduction to the Basics of Information Security and the Latest Case Studies lesson10 Cyber Security and Technology in the Financial Industry - Case study lesson11 CTF (capture the flag) Exercise lesson12 CTF (capture the flag) Exercise lesson13 Cryptography 1: Symmetric Key Encryption, MAC lesson14 Cryptography 2: Public Key Encryption, Digital Signatures lesson15 Cryptographic applications, Intellectual property rights, Copyright |
Text/Reference Books,etc. |
Handout |
PC or AV used in Class,etc. |
|
(More Details) |
|
Learning techniques to be incorporated |
|
Suggestions on Preparation and Review |
Students should review each lesson. |
Requirements |
|
Grading Method |
Evaluation based on exercises/small tests/reports. |
Practical Experience |
Experienced
|
Summary of Practical Experience and Class Contents based on it |
The lecturer will instruct secure information systems based on software development experience in an aeronautical system company and practical experience as an information security engineer who has a license on registered information security specialist. Some of the lecturers are currently engaged in practical work related to this course at companies, and will introduce examples of their work. registered information security specialist. |
Message |
|
Other |
|
Please fill in the class improvement questionnaire which is carried out on all classes. Instructors will reflect on your feedback and utilize the information for improving their teaching. |